The threat of an infected computer sending spam and viruses is a real one. The typical scenario is that one or more PCs are compromised through email, the Web or an infected USB drive. These machines then become spam-sending zombies. Zombies are compromised computers used by spammers that link similarly infected machines into networks called botnets. The botnet controller can orchestrate the activities of these hacked computers and most of the time, the organization that owns the compromised computer is totally unaware of it. Among other things, the controller can send spam from your infrastructure to your contacts or to unknown parties, all in your name!
Many organizations have discovered the benefits of out-of-the-box screening. In the event of a breach, ZEROSPAM can recommend experts to identify compromised computers and clean them up. Once the network has been sanitized, it can be configured so that the client will get hacked and avoid ending up on a blacklist.
The ideal configuration involves a reputable third party sender for commercial emailing, emailing to opt-in receivers and using an excellent anti-spam service.
Read more on the importance of outbound email hygiene .
" I just love not having to take care of spam. That's the way I want it. "- N. Bouvrette Hector